MITRE ATT&CK®

Stealing the data

MITRE ATT&CK - Stealing the data

Please tell us a little about yourself:

MITRE ATT&CK - Stealing the data
Huntsman

This is the third instalment in our analysis of an attack, and follows on from “MITRE ATT&CK® - Infiltrating the network”. In the previous article, we looked at how an attacker enumerated and discovered credentials, accounts, data and other systems on the network to spread to other targets.

We will now look at the final attack stages - gathering and exfiltrating sensitive data while preventing recovery and then conclude by looking at how an organisation can detect the different attack stages and use the MITRE ATT&CK® recommendations to defend against them.

GET THE PDF NOW